General
-
Target
ORDER-2030213F.pdf_1.xz
-
Size
7KB
-
Sample
230216-s1cgfahh6w
-
MD5
6e8a235f56282c5c14e483aaec9d6bba
-
SHA1
31c1a6e9245fd4db9a4850fbf6c1a06cb94bdb7a
-
SHA256
e73d13af5cc2005fe0edf474cdddc09d56802e6a5dfe6120ce79299e9ef44d95
-
SHA512
831d39996141cdf541a4d2efd2ff03d86289518bddfdd1d3c9eb6a4504d2471eeea4c108b249c0d8e63989c7ebb2789e5479b9872c31ee7a8ba82743368fda28
-
SSDEEP
192:69KsNvUnMw9N2RuoyXbGSiwVdWkppIw3O0V1BZ:8XWLkuoyXbNzVd/pD9v
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-2030213F.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ORDER-2030213F.vbs
Resource
win10v2004-20221111-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
ORDER-2030213F.vbs
-
Size
227KB
-
MD5
cfd1f9bddf2a1aac9386621f2df068d5
-
SHA1
abb692951d21f1820583716dd324de928dfd9b6b
-
SHA256
164d4f5ae08f512aa6341b37bf57d32bc471415185c63dd175e88a35626b20b6
-
SHA512
220b962cee21fcbc4049e2a98a2d5cd798820b6be0b5db678d041c7b3a35ce1f2ec0628d770ec812dbb98edccf138d8b3906cf6dd8fbdb4b217b372faf6e3e9f
-
SSDEEP
768:xMbGEQhUfQB8/UgFcxgfcdVH5xOnxWzi6R/6Y6oHDHrL1V0:WB
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-